awskeyring 1.3.2 → 1.3.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +8 -0
- data/CODE_OF_CONDUCT.md +2 -2
- data/README.md +1 -1
- data/Rakefile +4 -2
- data/awskeyring.gemspec +10 -2
- data/lib/awskeyring/validate.rb +2 -2
- data/lib/awskeyring/version.rb +1 -1
- data/man/awskeyring.5 +3 -3
- data/man/awskeyring.5.ronn +2 -2
- metadata +9 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3207b3732716f614eecc291edeaa629ebac97934e590cf7b6bf97d385cd593e5
|
4
|
+
data.tar.gz: 37c0275281e5f4b2e42e8319be344aba943f4fbf81fa64e687d8cbda8e8f827f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 158d8f44b19e2b40a4873ecfa84f22ac2751a8470409f45ec733d614e617a00b7ad7b52786c5d3ffa1d98149120603f04e6db21c5a279fecaee55e679e10718d
|
7
|
+
data.tar.gz: 0c9d3561a5c6ef181527e8ab52e858e17c5dd722403aec9df246606099c4b9bc66eb54dbacc98a770534012faf8fa52f3ebbab7c97a7fbaacd0673f5aac3f2f2
|
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,13 @@
|
|
1
1
|
# Changelog
|
2
2
|
|
3
|
+
## [v1.3.3](https://github.com/servian/awskeyring/tree/v1.3.3) (2020-06-04)
|
4
|
+
|
5
|
+
[Full Changelog](https://github.com/servian/awskeyring/compare/v1.3.2...v1.3.3)
|
6
|
+
|
7
|
+
**Implemented enhancements:**
|
8
|
+
|
9
|
+
- Change email references from Vibrato to Servian [\#64](https://github.com/servian/awskeyring/pull/64) ([tristanmorgan](https://github.com/tristanmorgan))
|
10
|
+
|
3
11
|
## [v1.3.2](https://github.com/servian/awskeyring/tree/v1.3.2) (2020-04-27)
|
4
12
|
|
5
13
|
[Full Changelog](https://github.com/servian/awskeyring/compare/v1.3.1...v1.3.2)
|
data/CODE_OF_CONDUCT.md
CHANGED
@@ -55,7 +55,7 @@ further defined and clarified by project maintainers.
|
|
55
55
|
## Enforcement
|
56
56
|
|
57
57
|
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
58
|
-
reported by contacting the project team at [tristan@
|
58
|
+
reported by contacting the project team at [tristan.morgan@servian.com](mailto:tristan.morgan@servian.com). All
|
59
59
|
complaints will be reviewed and investigated and will result in a response that
|
60
60
|
is deemed necessary and appropriate to the circumstances. The project team is
|
61
61
|
obligated to maintain confidentiality with regard to the reporter of an incident.
|
@@ -68,6 +68,6 @@ members of the project's leadership.
|
|
68
68
|
## Attribution
|
69
69
|
|
70
70
|
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
|
71
|
-
available
|
71
|
+
available [here](https://www.contributor-covenant.org/version/1/4/code-of-conduct.html)
|
72
72
|
|
73
73
|
[homepage]: https://www.contributor-covenant.org
|
data/README.md
CHANGED
@@ -99,7 +99,7 @@ To install this gem onto your local machine, run `bundle exec rake install`.
|
|
99
99
|
## Security
|
100
100
|
|
101
101
|
If you believe you have found a security issue in Awskeyring, please responsibly disclose by contacting me at
|
102
|
-
[tristan@
|
102
|
+
[tristan.morgan@servian.com](mailto:tristan.morgan@servian.com). Awskeyring is a Ruby script and as such Ruby is whitelisted
|
103
103
|
to access your "awskeyring" keychain. Use a strong password and keep the unlock time short.
|
104
104
|
|
105
105
|
## Contributing
|
data/Rakefile
CHANGED
@@ -15,14 +15,16 @@ GitHubChangelogGenerator::RakeTask.new :changelog do |config|
|
|
15
15
|
end
|
16
16
|
|
17
17
|
RuboCop::RakeTask.new do |rubocop|
|
18
|
-
rubocop.options = [
|
18
|
+
rubocop.options = %w[-D --enable-pending-cops]
|
19
19
|
rubocop.requires << 'rubocop-performance'
|
20
20
|
rubocop.requires << 'rubocop-rake'
|
21
21
|
rubocop.requires << 'rubocop-rspec'
|
22
22
|
rubocop.requires << 'rubocop-rubycw'
|
23
23
|
end
|
24
24
|
|
25
|
-
RSpec::Core::RakeTask.new(:spec)
|
25
|
+
RSpec::Core::RakeTask.new(:spec) do |rspec|
|
26
|
+
rspec.rspec_opts = %w[--order rand --format documentation --color]
|
27
|
+
end
|
26
28
|
|
27
29
|
desc 'Check filemode bits'
|
28
30
|
task :filemode do
|
data/awskeyring.gemspec
CHANGED
@@ -8,18 +8,26 @@ Gem::Specification.new do |spec|
|
|
8
8
|
spec.name = 'awskeyring'
|
9
9
|
spec.version = Awskeyring::VERSION
|
10
10
|
spec.authors = ['Tristan Morgan']
|
11
|
-
spec.email =
|
11
|
+
spec.email = 'tristan.morgan@servian.com'
|
12
12
|
|
13
13
|
spec.summary = 'Manages AWS credentials in the macOS keychain'
|
14
14
|
spec.description = 'Manages AWS credentials in the macOS keychain'
|
15
15
|
spec.homepage = Awskeyring::HOMEPAGE
|
16
|
-
spec.
|
16
|
+
spec.licenses = ['MIT']
|
17
17
|
|
18
18
|
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^spec/|^\..*|^.*\.png}) }
|
19
19
|
spec.bindir = 'exe'
|
20
20
|
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
21
21
|
spec.require_paths = ['lib']
|
22
22
|
|
23
|
+
spec.metadata = {
|
24
|
+
'bug_tracker_uri' => "#{Awskeyring::HOMEPAGE}/issues",
|
25
|
+
'changelog_uri' => "#{Awskeyring::HOMEPAGE}/blob/master/CHANGELOG.md",
|
26
|
+
'documentation_uri' => "https://rubydoc.info/gems/#{spec.name}/#{Awskeyring::VERSION}",
|
27
|
+
'source_code_uri' => "#{Awskeyring::HOMEPAGE}/tree/v#{Awskeyring::VERSION}",
|
28
|
+
'wiki_uri' => "#{Awskeyring::HOMEPAGE}/wiki"
|
29
|
+
}
|
30
|
+
|
23
31
|
spec.add_dependency('aws-sdk-iam')
|
24
32
|
spec.add_dependency('i18n')
|
25
33
|
spec.add_dependency('ruby-keychain')
|
data/lib/awskeyring/validate.rb
CHANGED
@@ -36,7 +36,7 @@ module Awskeyring
|
|
36
36
|
#
|
37
37
|
# @param [String] mfa_arn The users MFA arn
|
38
38
|
def self.mfa_arn(mfa_arn)
|
39
|
-
raise 'Invalid MFA ARN' unless %r(\Aarn:aws:iam::[0-9]{12}:mfa
|
39
|
+
raise 'Invalid MFA ARN' unless %r(\Aarn:aws:iam::[0-9]{12}:mfa/\S*\z).match?(mfa_arn)
|
40
40
|
|
41
41
|
mfa_arn
|
42
42
|
end
|
@@ -54,7 +54,7 @@ module Awskeyring
|
|
54
54
|
#
|
55
55
|
# @param [String] role_arn The role arn
|
56
56
|
def self.role_arn(role_arn)
|
57
|
-
raise 'Invalid Role ARN' unless %r(\Aarn:aws:iam::[0-9]{12}:role
|
57
|
+
raise 'Invalid Role ARN' unless %r(\Aarn:aws:iam::[0-9]{12}:role/\S*\z).match?(role_arn)
|
58
58
|
|
59
59
|
role_arn
|
60
60
|
end
|
data/lib/awskeyring/version.rb
CHANGED
data/man/awskeyring.5
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
2
|
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "AWSKEYRING" "5" "
|
4
|
+
.TH "AWSKEYRING" "5" "April 2020" "" ""
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBAwskeyring\fR \- is a small tool to manage AWS account keys in the macOS Keychain
|
@@ -169,10 +169,10 @@ awskeyring env personal\-aws
|
|
169
169
|
The motivation of this application is to provide a local secure store of AWS credentials using specifically in the macOS Keychain, to have them easily accessed from the Terminal, and to provide useful functions like assuming roles and opening the AWS Console from the cli\. For Enterprise environments there are better suited tools to use like HashiCorp Vault \fIhttps://vaultproject\.io/\fR\.
|
170
170
|
.
|
171
171
|
.SH "SECURITY"
|
172
|
-
If you believe you have found a security issue in Awskeyring, please responsibly disclose by contacting me at \fItristan@
|
172
|
+
If you believe you have found a security issue in Awskeyring, please responsibly disclose by contacting me at \fItristan\.morgan@servian\.com\fR\. Awskeyring is a Ruby script and as such Ruby is whitelisted to access your "awskeyring" keychain\. Use a strong password and keep the unlock time short\.
|
173
173
|
.
|
174
174
|
.SH "AUTHOR"
|
175
|
-
Tristan Morgan \fItristan@
|
175
|
+
Tristan Morgan \fItristan\.morgan@servian\.com\fR is the maintainer of Awskeyring\.
|
176
176
|
.
|
177
177
|
.SH "CONTRIBUTORS"
|
178
178
|
.
|
data/man/awskeyring.5.ronn
CHANGED
@@ -117,12 +117,12 @@ like [HashiCorp Vault](https://vaultproject.io/).
|
|
117
117
|
## SECURITY
|
118
118
|
|
119
119
|
If you believe you have found a security issue in Awskeyring, please responsibly disclose by contacting me at
|
120
|
-
[tristan@
|
120
|
+
[tristan.morgan@servian.com](mailto:tristan.morgan@servian.com). Awskeyring is a Ruby script and as such Ruby is whitelisted to
|
121
121
|
access your "awskeyring" keychain. Use a strong password and keep the unlock time short.
|
122
122
|
|
123
123
|
## AUTHOR
|
124
124
|
|
125
|
-
Tristan Morgan <tristan@
|
125
|
+
Tristan Morgan <tristan.morgan@servian.com> is the maintainer of Awskeyring.
|
126
126
|
|
127
127
|
## CONTRIBUTORS
|
128
128
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: awskeyring
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.3.
|
4
|
+
version: 1.3.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Tristan Morgan
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-04
|
11
|
+
date: 2020-06-04 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-iam
|
@@ -67,8 +67,7 @@ dependencies:
|
|
67
67
|
- !ruby/object:Gem::Version
|
68
68
|
version: '0'
|
69
69
|
description: Manages AWS credentials in the macOS keychain
|
70
|
-
email:
|
71
|
-
- tristan@vibrato.com.au
|
70
|
+
email: tristan.morgan@servian.com
|
72
71
|
executables:
|
73
72
|
- awskeyring
|
74
73
|
extensions: []
|
@@ -95,7 +94,12 @@ files:
|
|
95
94
|
homepage: https://github.com/servian/awskeyring
|
96
95
|
licenses:
|
97
96
|
- MIT
|
98
|
-
metadata:
|
97
|
+
metadata:
|
98
|
+
bug_tracker_uri: https://github.com/servian/awskeyring/issues
|
99
|
+
changelog_uri: https://github.com/servian/awskeyring/blob/master/CHANGELOG.md
|
100
|
+
documentation_uri: https://rubydoc.info/gems/awskeyring/1.3.3
|
101
|
+
source_code_uri: https://github.com/servian/awskeyring/tree/v1.3.3
|
102
|
+
wiki_uri: https://github.com/servian/awskeyring/wiki
|
99
103
|
post_install_message:
|
100
104
|
rdoc_options: []
|
101
105
|
require_paths:
|